61,749 research outputs found

    Socially Trusted Collaborative Edge Computing in Ultra Dense Networks

    Full text link
    Small cell base stations (SBSs) endowed with cloud-like computing capabilities are considered as a key enabler of edge computing (EC), which provides ultra-low latency and location-awareness for a variety of emerging mobile applications and the Internet of Things. However, due to the limited computation resources of an individual SBS, providing computation services of high quality to its users faces significant challenges when it is overloaded with an excessive amount of computation workload. In this paper, we propose collaborative edge computing among SBSs by forming SBS coalitions to share computation resources with each other, thereby accommodating more computation workload in the edge system and reducing reliance on the remote cloud. A novel SBS coalition formation algorithm is developed based on the coalitional game theory to cope with various new challenges in small-cell-based edge systems, including the co-provisioning of radio access and computing services, cooperation incentives, and potential security risks. To address these challenges, the proposed method (1) allows collaboration at both the user-SBS association stage and the SBS peer offloading stage by exploiting the ultra dense deployment of SBSs, (2) develops a payment-based incentive mechanism that implements proportionally fair utility division to form stable SBS coalitions, and (3) builds a social trust network for managing security risks among SBSs due to collaboration. Systematic simulations in practical scenarios are carried out to evaluate the efficacy and performance of the proposed method, which shows that tremendous edge computing performance improvement can be achieved.Comment: arXiv admin note: text overlap with arXiv:1010.4501 by other author

    Tipping the scales: ambidexterity practices on e-HRM projects

    Get PDF
    Purpose: We examine and conceptualise the ways in which a balance can be achieved between optimising the efficiency and effectiveness of electronic HRM (e-HRM) systems for human resource management (HRM) and enabling innovation to occur during the system implementation. Design/methodology/approach: An intepretive case study of a UK local authority e-HRM system implementation is examined using the notion of ambidexterity as an analytical device. Ambidexterity relates to how an organisation develops the ability to operate efficiently in the now, while at the same time being able to adapt to environmental changes around and ahead of them in order to grow into the future. Findings: As an intra-organisational capability, ambidexterity is found to derive from the simultaneous interplay and balancing of dual capabilities: exploitation and exploration.. E-HRM exploitation concerned the capability to generate new knowledge with innovatory effects, created through the everyday practices performed by practitioners at all levels in the organisation. E-HRM exploration, rather than being a purposeful act, was found to be an accidental consequence of engaging in exploitation to maintain the status quo. Originality/value: There is a lack of detailed investigation of how organisations actually achieve ambidexterity, particularly in three under-researched areas: ambidexterity in the public sector, at HR functional level and e-HRM systems implementation. Bundling these three areas into an integrated examination allows us to both identify how exploitation and exploration play out in the ambidextrous practices of an e-HRM project and also to identify the dimensions of ambidexterity in balancing e-HRM work

    Malicious User Experience Design Research for Cybersecurity

    Full text link
    This paper explores the factors and theory behind the user-centered research that is necessary to create a successful game-like prototype, and user experience, for malicious users in a cybersecurity context. We explore what is known about successful addictive design in the fields of video games and gambling to understand the allure of breaking into a system, and the joy of thwarting the security to reach a goal or a reward of data. Based on the malicious user research, game user research, and using the GameFlow framework, we propose a novel malicious user experience design approac

    The organizational design of nonprofits for people with disabilities

    Get PDF
    Utilizando información obtenida de los directivos de 105 pequeñas organizaciones sin fines de lucro españolas que, en el año 2007, se dedicaban a la prestación de servicios a personas con discapacidad, hemos analizado como el diseño organizativo –en concreto, los sistemas de recompensas extrínsecas e intrínsecas- influye sobre la delegación, la motivación y la transferencia de conocimiento a la hora de lograr el objetivo de la organización consistente en mejorar la calidad de vida de las personas que viven con una discapacidad. Los resultados muestran que, debido a la carencia de conocimiento técnico, los directivos de estas entidades no lucrativas (ENL) deben delegar derechos de decisión en empleados cualificados y utilizar en mayor medida recompensas intrínsecas y extrínsecas para motivar a los empleados a que transmitan conocimiento entre ellos eficientemente.We use data obtained from managers of 105 small nonprofit organizations (NPOs) providing services to people with disabilities in Spain in 2007 to examine how organizational design—particularly, extrinsic and intrinsic reward systems—impacts delegation, motivation, and knowledge transfer to achieve the NPO’s goal to improve the lives of persons living with disabilities. We find that, due to lack of technical knowledge, managers of these NPOs must delegate decision rights to qualified employees and that they successfully use a higher degree of intrinsic and extrinsic rewards to motivate employees to transfer knowledge among themselves efficiently

    Local flexibility market design for aggregators providing multiple flexibility services at distribution network level

    Get PDF
    This paper presents a general description of local flexibility markets as a market-based management mechanism for aggregators. The high penetration of distributed energy resources introduces new flexibility services like prosumer or community self-balancing, congestion management and time-of-use optimization. This work is focused on the flexibility framework to enable multiple participants to compete for selling or buying flexibility. In this framework, the aggregator acts as a local market operator and supervises flexibility transactions of the local energy community. Local market participation is voluntary. Potential flexibility stakeholders are the distribution system operator, the balance responsible party and end-users themselves. Flexibility is sold by means of loads, generators, storage units and electric vehicles. Finally, this paper presents needed interactions between all local market stakeholders, the corresponding inputs and outputs of local market operation algorithms from participants and a case study to highlight the application of the local flexibility market in three scenarios. The local market framework could postpone grid upgrades, reduce energy costs and increase distribution grids’ hosting capacity.Postprint (published version

    End-to-End Privacy for Open Big Data Markets

    Get PDF
    The idea of an open data market envisions the creation of a data trading model to facilitate exchange of data between different parties in the Internet of Things (IoT) domain. The data collected by IoT products and solutions are expected to be traded in these markets. Data owners will collect data using IoT products and solutions. Data consumers who are interested will negotiate with the data owners to get access to such data. Data captured by IoT products will allow data consumers to further understand the preferences and behaviours of data owners and to generate additional business value using different techniques ranging from waste reduction to personalized service offerings. In open data markets, data consumers will be able to give back part of the additional value generated to the data owners. However, privacy becomes a significant issue when data that can be used to derive extremely personal information is being traded. This paper discusses why privacy matters in the IoT domain in general and especially in open data markets and surveys existing privacy-preserving strategies and design techniques that can be used to facilitate end to end privacy for open data markets. We also highlight some of the major research challenges that need to be address in order to make the vision of open data markets a reality through ensuring the privacy of stakeholders.Comment: Accepted to be published in IEEE Cloud Computing Magazine: Special Issue Cloud Computing and the La

    Reasons for failure of web-based application IT projects – An Empirical Study in Malaysia

    Get PDF
    Setiap tahun, organisasi rugi berjuta-juta ringgit kerana aplikasi berasaskan sesawang teknologi maklumat projek gagal. Every year, organizations lose millions of dollars due to failure of web-based application information technology (IT) projects

    Work Matters for Health

    Get PDF
    Provides an overview of how physical and mental health is affected by work -- the physical environment, psychosocial aspects, wages and benefits, and the need to balance responsibilities. Summarizes promising work-based strategies to improve health

    Reasons for failure of web-based application IT projects – An Empirical Study in Malaysia

    Get PDF
    Setiap tahun, organisasi rugi berjuta-juta ringgit kerana aplikasi berasaskan sesawang teknologi maklumat projek gagal. Every year, organizations lose millions of dollars due to failure of web-based application information technology (IT) projects
    corecore